# isolation
9 articlestagged with “isolation”
Memory Isolation Bypass Techniques
Bypassing user-level and session-level memory isolation to access memories from other users or sessions.
Cloud Fine-Tuning Service Security
Security assessment of cloud-based fine-tuning services including data isolation, model access, and output controls.
Network Isolation for Cloud AI Workloads
Implementing network isolation strategies for cloud AI deployments including private endpoints, VPC configurations, service mesh integration, and data plane segmentation for LLM inference and training workloads.
Sandboxing AI Code Generation
Design patterns for sandboxing AI code generation and execution, covering container isolation, capability restriction, network controls, and runtime monitoring.
Agent Sandboxing Strategies
Sandboxing and isolation strategies for limiting the blast radius of compromised LLM agents.
Multi-Tenant Isolation for LLM Services
Implementing strong tenant isolation in multi-tenant LLM services to prevent cross-tenant attacks.
AI Workload Isolation
Isolation techniques for AI workloads using VMs, containers, and trusted execution environments (TEEs).
GPU Sharing and Isolation Security
Security implications of GPU sharing in multi-tenant AI infrastructure and isolation strategies.
Sandboxed Tool Execution
Step-by-step walkthrough for running LLM tool calls in isolated sandboxes, covering container-based isolation, resource limits, network restrictions, and output sanitization.